Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 278 (0.046 secs)
You searched for: (collection:opensecuritytraining OR mediatype:opensecuritytraining) AND -mediatype:collection
[1] 2 3 4 5 6     Next    Last
[movies]Rootkits: What they are, and how to find them. Day 1 Part 4 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,254
[movies]Day 2 Part 6 Reverse Engineering Malware - How CreateFile() works - Frank Poz
tmp
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 77
[movies]Day 2 Part 2 Reverse Engineering Malware - Network Communications - Command & Control, Indicators - Frank Poz
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our computers, from...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 610
[movies]2013 Day2P18 Life of Binaries: ELF Intro - Xeno Kovah
The class materials are available at  http://www.OpenSecurityTraining.info/LifeOfBinaries.htmlFollow us on Twitter for class news @OpenSecTraining.Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated.Topics will include but are not limited to:*Scanning and tokenizing source code.*Parsing a grammar and...
Keywords: OpenSecurityTraining.info; Computer security class; security; Computer Security; Cyber Security; Host Security; binaries; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; linking; x86 assembly; IAT; IAT hooking; EAT; TLS; DEP; ASLR; SEH; computer virus; packers; UPX; debugging; WinDbg; ELF binary format; Executable and Linkable Format; ELF
Downloads: 210
[movies]2013 Day1P18 Life of Binaries: BinHunt Round 5 - Xeno Kovah
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining. Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: *Scanning and tokenizing source code...
Keywords: OpenSecurityTraining.info; Computer security class; security; Computer Security; Cyber Security; Host Security; binaries; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; linking; x86 assembly; IAT; IAT hooking; EAT; TLS; DEP; ASLR; SEH; computer virus; packers; UPX; debugging; WinDbg; ELF binary format; Executable and Linkable Format; ELF
Downloads: 288
[movies]2013 Day 1 Part 15 Introduction To Reverse Engineering Software - Day 1 Review - Frank Poz
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unders...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology; malware
Downloads: 559
[movies]2013 Day2P31 Life of Binaries: Viruses - Xeno Kovah
The class materials are available at  http://www.OpenSecurityTraining.info/LifeOfBinaries.htmlFollow us on Twitter for class news @OpenSecTraining.Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated.Topics will include but are not limited to:*Scanning and tokenizing source code.*Parsing a grammar and...
Keywords: OpenSecurityTraining.info; Computer security class; security; Computer Security; Cyber Security; Host Security; binaries; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; linking; x86 assembly; IAT; IAT hooking; EAT; TLS; DEP; ASLR; SEH; computer virus; packers; UPX; debugging; WinDbg; ELF binary format; Executable and Linkable Format; ELF
Downloads: 215
[movies]Dynamic Malware Analysis Day 2 Part 03 - Persistence Lab Hydraq With Autoruns - Veronica Kovah
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisti...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 225
[movies]Dynamic Malware Analysis Day 1 Part 06 - Background: Windows Processes - Veronica Kovah
Get the class materials to follow along athttp://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisting...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 334
[movies]Day 2 Part 3: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 367
[movies]Day 1 Part 13: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 340
[movies]Day 1 Part 2: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,393
[movies]Day 2 Part 6: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 345
[movies]Day 1 Part 1: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 2,556
[movies]Rootkits: What they are, and how to find them. Day 1 Part 2 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,484
[movies]Day 1 Part 19: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 285
[movies]Flow Analysis & Network Hunting Part 10: Analytics - Data Fusion - Mike McFail & Ben Actis
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational awareness and ne...
Keywords: OpenSecurityTraining.info; network security; netflow; flow analysis; netflow analysis; network hunting; intrusion detection; IDS; YAF; Silk; iSilk; Bro; Argus; network analysis; network sensoring; sensoring; Computers; Computer Security; Computer Security Class; Computer Security Training; Cyber Security; Technology; Training; Education
Downloads: 548
[movies]2013 Day 2 Part 6 Introduction To Reverse Engineering Software - Phase 6 Walkthrough - Frank Poz
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unders...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology; malware
Downloads: 639
[movies]Day 2 Part 1: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,364
[movies]Dynamic Malware Analysis Day 2 Part 17 - Malware Functionality Lab Set Windows Hook Ex - Veronica Kovah
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisti...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 272
[movies]Day 2 Part 4: Introduction to ARM - Gananand Kini
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimiz...
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 844
[movies]Dynamic Malware Analysis Day 2 Part 01 - Day 1 Review - Veronica Kovah
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persistin...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 216
[movies]Day 1 Part 1 Reverse Engineering Malware - Prerequisites - Frank Poz
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our computers, from...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 1,717
[movies]Dynamic Malware Analysis Day 1 Part 15 - Persistence Lab Using Autoruns - Veronica Kovah
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisting...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 236
[movies]Rootkits: What they are, and how to find them. Day 2 Part 5 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,227
[movies]2013 Day 1 Part 1 Introduction To Reverse Engineering Software - What Is RE And What Can It Tell Me? - Frank Poz
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unders...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology; malware
Downloads: 2,485
[movies]Dynamic Malware Analysis Day 1 Part 04 - Background: File Identification - Veronica Kovah
Get the class materials to follow along athttp://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisting...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 319
[movies]2013 Day2P10 Life of Binaries: BinHunt Round 6 - Xeno Kovah
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.htmlFollow us on Twitter for class news @OpenSecTraining.Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated.Topics will include but are not limited to:*Scanning and tokenizing source code.*Parsing a grammar an...
Keywords: OpenSecurityTraining.info; Computer security class; security; Computer Security; Cyber Security; Host Security; binaries; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; linking; x86 assembly; IAT; IAT hooking; EAT; TLS; DEP; ASLR; SEH; computer virus; packers; UPX; debugging; WinDbg; ELF binary format; Executable and Linkable Format; ELF
Downloads: 188
[movies]2013 Day 2 Part 4 Introduction To Reverse Engineering Software - Phase 6 Introduction - Frank Poz
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unders...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology; malware
Downloads: 657
[movies]Day 2 Part 1: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,152
[movies]The Life Of Binaries Day 2 Part 3 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,650
[movies]Rootkits: What they are, and how to find them. Day 2 Part 3 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,262
[movies]Dynamic Malware Analysis Day 1 Part 07 - Background: Windows Registry - Veronica Kovah
Get the class materials to follow along athttp://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisting...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 304
[movies]Day 1 Part 11 Reverse Engineering Malware - Data Encoding - Common Algorithms - Base64 - Frank Poz
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our computers, from...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 776
[movies]Intermediate Intel X86: Architecture, Assembly, & Applications Day 2 Part 3 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through a...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; rootkits; paging; segmentation; memory management; virtual memory; physical memory; interrupts; port IO; debugging; OpenSecurityTraining.info
Downloads: 1,733
[movies]Day 1 Part 17: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 322
[movies]Dynamic Malware Analysis Day 1 Part 10 - Isolated Malware Lab Setup - Veronica Kovah
Get the class materials to follow along athttp://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is: Persisting...
Keywords: OpenSecurityTraining.info; Reverse Engineering; Malware; Malware Analysis; Dynamic Analysis; Malware Dynamic Analysis; VirtualBox; PE; Portable Executable; File Identification; Windows Libraries; Windows Processes; Windows Registry; Windows Services; Networking; Wireshark; Malware Terminology; Behavioral Analysis; Malware Sandbox; CuckooBox; Malware Persistence; AutoRuns; Malware Maneuvering; DLL Injection; API Tracing; Win32Override; RegShot; ProcMon; Process Monitor; Poison Ivy RAT; YARA; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 316
[movies]Intermediate Intel X86: Architecture, Assembly, & Applications Day 1 Part 6 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through a...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; rootkits; paging; segmentation; memory management; virtual memory; physical memory; interrupts; port IO; debugging; OpenSecurityTraining.info
Downloads: 1,711
[movies]Day 1 Part 4: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,252
[movies]Introductory Intel x86: Architecture, Assembly, Applications, Day 1, Part 5 - Xeno Kovah
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation...
Keywords: Intel; x86; Intel x86; IA32; training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; disassembly; reverse engineering; OpenSecurityTraining.info
Downloads: 4,395
[movies]Day 2 Part 6 Reverse Engineering Malware - How CreateFile() works - Frank Poz
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our computers, from...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; Malware; Malware Analysis; Static Analysis; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology
Downloads: 633
[movies]Rootkits: What they are, and how to find them. Day 1 Part 3 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,319
[movies]The Life Of Binaries Day 2 Part 6 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,904
[movies]Offensive, Defensive, and Forensic Techniques for Determining Web User Identity: Part 4 Browser Identification - Zachary Zebrowski
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous...
Keywords: opensecuritytraining.info; privacy; web privacy; browser privacy; email privacy; anonymization; anonymizers; user identification; user obfuscation; TOR; javascript; html5; geolocation; IP geolocation; geolocation; forensics; computer forensics
Downloads: 623
[movies]Day 2 Part 2: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,439
[movies]2013 Day2P12 Life of Binaries: Relocations - Xeno Kovah
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.htmlFollow us on Twitter for class news @OpenSecTraining.Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated.Topics will include but are not limited to:*Scanning and tokenizing source code.*Parsing a grammar an...
Keywords: OpenSecurityTraining.info; Computer security class; security; Computer Security; Cyber Security; Host Security; binaries; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; linking; x86 assembly; IAT; IAT hooking; EAT; TLS; DEP; ASLR; SEH; computer virus; packers; UPX; debugging; WinDbg; ELF binary format; Executable and Linkable Format; ELF
Downloads: 193
[movies]2013 Day 1 Part 5 Introduction To Reverse Engineering Software - Applying the RE Algorithm to the Bomb Lab - Frank Poz
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unders...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology; malware
Downloads: 763
[movies]2013 Day1P11 Life of Binaries: BinHunt Round 3 - Xeno Kovah
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining. Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: *Scanning and tokenizing source code...
Keywords: OpenSecurityTraining.info; Computer security class; security; Computer Security; Cyber Security; Host Security; binaries; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; linking; x86 assembly; IAT; IAT hooking; EAT; TLS; DEP; ASLR; SEH; computer virus; packers; UPX; debugging; WinDbg; ELF binary format; Executable and Linkable Format; ELF
Downloads: 253
[movies]Flow Analysis & Network Hunting Part 6: Bro - Mike McFail & Ben Actis
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational awareness and ne...
Keywords: OpenSecurityTraining.info; network security; netflow; flow analysis; netflow analysis; network hunting; intrusion detection; IDS; YAF; Silk; iSilk; Bro; Argus; network analysis; network sensoring; sensoring; Computers; Computer Security; Computer Security Class; Computer Security Training; Cyber Security; Technology; Training; Education
Downloads: 638
[movies]2013 Day 2 Part 2 Introduction To Reverse Engineering Software - Phase 5 Introduction - Frank Poz
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to unders...
Keywords: OpenSecurityTraining.info; Disassembly; Reverse Engineering; IDA; IDA Pro; Debugging; Intel; x86; Intel x86; IA32; Computer security class; Computer Security; Cyber Security; CyberSecurity; Host Security; Training; Education; Multi-day-class; Multi-day-training; Classes; Computer; Computers; Security; Technology; malware
Downloads: 592
[1] 2 3 4 5 6     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies

Terms of Use (10 Mar 2001)